Описание
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
Ссылки
- Issue TrackingVendor Advisory
- Issue TrackingVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*
EPSS
Процентиль: 15%
0.00048
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-59
CWE-59
Связанные уязвимости
CVSS3: 7.3
ubuntu
больше 4 лет назад
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
github
больше 3 лет назад
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
EPSS
Процентиль: 15%
0.00048
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-59
CWE-59